Passive Image Forensic Method to Detect Resampling Forgery inDigital Images
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: The digital images are becoming important part in the field of information forensics and security,because of the popularity of image editing tools, digital images can be tampered in a very efficient mannerwithout leaving any visual clue. As a consequence, the content of digital images cannot be taken as for granted.Therefore it is must to create forensic techniques which is capable of detecting tampering in image. In general,the image forgery technologies often utilizes the scaling, rotation or skewing operations to tamper some regionsin the image, in which the resampling is demanded. Forged area is often resized & rotated to make itproportional with respect to neighboring unforged area. This is called as resampling operation which changescertain characteristics of the pasted portion. By observing the detectable periodic distribution propertiesgenerated from the resampling, propose a method based on the Peak Value Identification Classifier to detect thetampered regions and find the Peak Signal to Noise Ratio (PSNR) to know about quality of resampled image.The experimental results show that the proposed method outperforms the conventional methods in terms ofrecall and precision.
Authors and Affiliations
Amaninder Kaur , Sheenam Malhotra
A Quantitative Measurement of Software Requirement Factors using Goal Question Metric (GQM) Approach
Abstract: Every application software that we propose to develop can be thought of a group or collection of related requirements specified by the user and these requirements are the foundation from which the quality...
GPRS Based LAN Monitoring and Controlling
Abstract : The GPRS based LAN monitoring and controlling system is mainly developed to focus on expansion of various networks services or facilities which are essential for brilliantly monitoring a LAN network. In...
Simulated Analysis and Enhancement of Blowfish Algorithm
Abstract: This paper represents or analyzes the security of system based on Blowfish. Blowfish mainly focuses on the encrypt and decrypt techniques and algorithms apply for cryptanalysis. It describe the algorithms for e...
Overview: Importance of Network Security and Future Issues
Abstract: Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a bett...
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Abstract: Quick assessment of advanced information trade happens as of late. Because of that security of data is much critical in information stockpiling and transmission process. That implies there is a need to shield t...